CVE-2024-56657

In the Linux kernel, the following vulnerability has been resolved: ALSA: control: Avoid WARN() for symlink errors Using WARN() for showing the error of symlink creations don't give more information than telling that something goes wrong, since the usual code path is a lregister callback from each control element creation. More badly, the use of WARN() rather confuses fuzzer as if it were serious issues. This patch downgrades the warning messages to use the normal dev_err() instead of WARN(). For making it clearer, add the function name to the prefix, too.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*

History

06 Jan 2025, 19:28

Type Values Removed Values Added
First Time Linux linux Kernel
Linux
CPE cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc1:*:*:*:*:*:*
cpe:2.3:o:linux:linux_kernel:6.13:rc2:*:*:*:*:*:*
CWE NVD-CWE-noinfo
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.5
References () https://git.kernel.org/stable/c/36c0764474b637bbee498806485bed524cad486b - () https://git.kernel.org/stable/c/36c0764474b637bbee498806485bed524cad486b - Patch
References () https://git.kernel.org/stable/c/d5a1ca7b59804d6779644001a878ed925a4688ca - () https://git.kernel.org/stable/c/d5a1ca7b59804d6779644001a878ed925a4688ca - Patch
References () https://git.kernel.org/stable/c/b2e538a9827dd04ab5273bf4be8eb2edb84357b0 - () https://git.kernel.org/stable/c/b2e538a9827dd04ab5273bf4be8eb2edb84357b0 - Patch

27 Dec 2024, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-12-27 15:15

Updated : 2025-01-06 19:28


NVD link : CVE-2024-56657

Mitre link : CVE-2024-56657


JSON object : View

Products Affected

linux

  • linux_kernel